Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Institut für Informatik

FB 4: Informatik / Universität Koblenz

Universitätsstraße 1, 56070 Koblenz
  • 0261/287 - 2720
  • 0261/287 - 2721
Publikationen
Ergebnisse pro Seite:  10

Furbach, Ulrich; Glöckner, Ingo; Pelzer, Björn

An application of automated reasoning in natural language question answering

AI Communications. Bd. 23. H. 2-3. Amsterdam: IOS Press 2010 S. 241 - 265


Zöbel, Dieter; Weyand, Christian

An Integrated Software Concept for Autonomous Driving in the Context of Intermodal Freight Traffic

Michael Bauer; Jaime Lloret Mauri; Oana Dini (Hrsg). Proceedings of the Sixth International Conference on Autonomic and Autonomous Systems ICAS 2010: 7-13 March 2010; Cancun, Mexico. Los Alamitos, CA: IEEE Computer Society 2010 S. 125 - 130


Faber, Johannes; Ihlemann, Carsten; Jacobs, Swen et al.

Automatic Verification of Parametric Specifications with Complex Topologies

Dominique Méry; Stephan Merz (Hrsg). Integrated Formal Methods: 8th International Conference, IFM 2010, Nancy, France, October 11-14, 2010. Proceedings. Berlin: Springer 2010 S. 152 - 167


Frey, Hannes

Best case energy analysis of localized euclidean minimum spanning tree based multicasting in ad hoc and sensor networks

Violet R. Syrotiuk; Fatih Alag; Brahim Bensaou; Özgür B. Akan (Hrsg). MSWIM'10: Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems; Bodrum, Turkey; October 17–21, 2010. New York, NY: ACM Association for Computing Machinery 2010 S. 195 - 204



Beckers, Kristian; Hirsch, Martin; Jürjens, Jan

Compliance in Clouds: A cloud computing security perspective

GI SECMGT-Workshop. Frankfurt (Germany). 2010 S. 1 - 26


Sheikh Sadi, Muhammad; Myers, D. G.; Ortega-Sanchez, Cesar et al.

Component criticality analysis to minimize soft errors risk

International Journal of Computer Systems Science & Engineering. Bd. 25. H. 5. London: CRL 2010 S. 23 - 37


Rybalchenko, Andrey; Sofronie-Stokkermans, Viorica

Constraint solving for interpolation

Journal of Symbolic Computation. Bd. 45. H. 11. Amsterdam: Elsevier 2010 S. 1212 - 1233


Aizatulin, Mihhail; Gordon, Andrew D.; Jürjens, Jan

Cryptographic Security Verification for C by Symbolic Execution: A 5-minute presentation

Computer Security Foundations Symposium (CSF). 2010


Houmb, Siv Hilde; Islam, Shareeful; Knauss, Eric et al.

Eliciting security requirements and tracing them to design: an integration of Common Criteria, heuristics, and UMLsec

Requirements Engineering. Bd. 15. H. 1. London: Springer 2010 S. 63 - 93